A large-scale empirical analysis of the vulnerabilities introduced by third-party components in IoT firmware.
Binbin ZhaoShouling JiJiacheng XuYuan TianQiuyang WeiQinying WangChenyang LyuXuhong ZhangChangting LinJingzheng WuRaheem BeyahPublished in: ISSTA (2022)